Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670550
R. Sridhar, N. Thamizh Selvan, S. Jeevananthan, PV Sujith Chowdary
This paper proposes modeling and simulation of photovoltaic model. Taking in to account the temperature and sun's irradiance, the PV array is modeled and its voltage current characteristics and the power and voltage characteristics are simulated. This enables the dynamics of PV system to be easily simulated and optimized. It is noticed that the output characteristics of a PV array are influenced by the environmental factors and the conversion efficiency is low. Therefore a maximum power tracking (MPPT) technique is needed to track the peak power to maximize the produced energy. The maximum power point in the power -voltage graph is identified by an algorithm called perturbation & observation (P&O) method or Hill climbing. This algorithm will identify the suitable duty ratio in which the DC/DC converter should be operated to maximize the power output. The results confirm that the photo voltaic array with proposed MPPT controller can operate in the maximum power point for the whole range of assumed solar data (irradiance and temperature).
{"title":"Performance improvement of a photo voltaic array using MPPT (P&O) technique","authors":"R. Sridhar, N. Thamizh Selvan, S. Jeevananthan, PV Sujith Chowdary","doi":"10.1109/ICCCCT.2010.5670550","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670550","url":null,"abstract":"This paper proposes modeling and simulation of photovoltaic model. Taking in to account the temperature and sun's irradiance, the PV array is modeled and its voltage current characteristics and the power and voltage characteristics are simulated. This enables the dynamics of PV system to be easily simulated and optimized. It is noticed that the output characteristics of a PV array are influenced by the environmental factors and the conversion efficiency is low. Therefore a maximum power tracking (MPPT) technique is needed to track the peak power to maximize the produced energy. The maximum power point in the power -voltage graph is identified by an algorithm called perturbation & observation (P&O) method or Hill climbing. This algorithm will identify the suitable duty ratio in which the DC/DC converter should be operated to maximize the power output. The results confirm that the photo voltaic array with proposed MPPT controller can operate in the maximum power point for the whole range of assumed solar data (irradiance and temperature).","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132049493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670767
S. Sujatha, M. Sathik
The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3×3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence is then converted into a watermark pattern in the form of a Hankel matrix to improve security of watermarking process and is then embedded within the host image. The operation of embedding and extraction of watermark is done in high frequency domain of Discrete Wavelet Transform since small modifications in this domain are not perceived by human eyes. This watermarking scheme deals with the extraction of the watermark information in the absence of original image, hence the blind scheme was obtained.
{"title":"Feature based blind approach for robust watermarking","authors":"S. Sujatha, M. Sathik","doi":"10.1109/ICCCCT.2010.5670767","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670767","url":null,"abstract":"The central idea of this paper is to propose an innovative watermarking scheme for digital image authentication which withstands common image processing attacks. Some pixels are randomly selected from original image, so that all of them have a valid 3×3 neighborhoods. A binary sequence is constructed from those pixels by comparing them against average values of neighborhoods. The binary sequence is then converted into a watermark pattern in the form of a Hankel matrix to improve security of watermarking process and is then embedded within the host image. The operation of embedding and extraction of watermark is done in high frequency domain of Discrete Wavelet Transform since small modifications in this domain are not perceived by human eyes. This watermarking scheme deals with the extraction of the watermark information in the absence of original image, hence the blind scheme was obtained.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129234908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670736
N. Prabakaran, E. Nallaperumal
This work is a new proposal of neural synchronization, which is a communication of two Tree Parity Machines (TPMs) for agreement on a common secret key over a public channel. This can be achieved by two TPMs, which are trained on their mutual output, which can synchronize to a time dependent state of identical synaptic weight vectors. In the proposed TPMs random inputs are replaced with queries, which are considered. The queries depend on the current state of A and B TPMs. Then, TPM's hidden layers of each output vectors are compared. That is, the output vectors of hidden unit using Hebbian learning rule and dynamic unit using Random walk learning rule are compared. Among the compared values, the output layer receives one of the best values. In this paper, the increased synchronization time of the co-operating attacker against the flipping attack is also analyzed.
{"title":"Neural cryptography with queries for co-operating attackers and effective number of keys","authors":"N. Prabakaran, E. Nallaperumal","doi":"10.1109/ICCCCT.2010.5670736","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670736","url":null,"abstract":"This work is a new proposal of neural synchronization, which is a communication of two Tree Parity Machines (TPMs) for agreement on a common secret key over a public channel. This can be achieved by two TPMs, which are trained on their mutual output, which can synchronize to a time dependent state of identical synaptic weight vectors. In the proposed TPMs random inputs are replaced with queries, which are considered. The queries depend on the current state of A and B TPMs. Then, TPM's hidden layers of each output vectors are compared. That is, the output vectors of hidden unit using Hebbian learning rule and dynamic unit using Random walk learning rule are compared. Among the compared values, the output layer receives one of the best values. In this paper, the increased synchronization time of the co-operating attacker against the flipping attack is also analyzed.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115415514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670566
Mrs. Saji, Dr. Sasi Kumar
Tuning of a pH process is a challenging problem due to the strong on-line non-linearity and extreme sensitivity to disturbances of the process. Hence, a nonlinear control strategy based on sliding mode, which is a standard approach to tackle the parametric and modeling uncertainties of a nonlinear system, is chosen for tuning a pH process. Fuzzy Sliding Mode Control (FSMC) as a robust and intelligent nonlinear control technique is proposed to control processes with severe nonlinearity and unknown models. The proportional and integral constants are adjusted by new tuning rule of fuzzy to adapt with the extreme condition of process. Sliding mode control is introduced into classical model free Fuzzy Logic Control(FLC) for discrete time nonlinear systems with uncertainty to design a novel fuzzy sliding mode control to meet the requirement of necessary and sufficient reaching conditions of tuning a pH process. The simulation results show that the proposed controller outperforms the classical fuzzy logic controller in stability, convergence and robustness. Here Sliding Fuzzy logic control for obtaining the optimal design of the pH process is explained. The performance of the algorithm in obtaining the optimal tuning values has been analyzed in pH process through computer simulation.
{"title":"Fuzzy Sliding Mode Control for a pH process","authors":"Mrs. Saji, Dr. Sasi Kumar","doi":"10.1109/ICCCCT.2010.5670566","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670566","url":null,"abstract":"Tuning of a pH process is a challenging problem due to the strong on-line non-linearity and extreme sensitivity to disturbances of the process. Hence, a nonlinear control strategy based on sliding mode, which is a standard approach to tackle the parametric and modeling uncertainties of a nonlinear system, is chosen for tuning a pH process. Fuzzy Sliding Mode Control (FSMC) as a robust and intelligent nonlinear control technique is proposed to control processes with severe nonlinearity and unknown models. The proportional and integral constants are adjusted by new tuning rule of fuzzy to adapt with the extreme condition of process. Sliding mode control is introduced into classical model free Fuzzy Logic Control(FLC) for discrete time nonlinear systems with uncertainty to design a novel fuzzy sliding mode control to meet the requirement of necessary and sufficient reaching conditions of tuning a pH process. The simulation results show that the proposed controller outperforms the classical fuzzy logic controller in stability, convergence and robustness. Here Sliding Fuzzy logic control for obtaining the optimal design of the pH process is explained. The performance of the algorithm in obtaining the optimal tuning values has been analyzed in pH process through computer simulation.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122857907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670591
J. Bodapati, K. Kishore, N. Veeranjaneyulu
In this work, we proposed a novel authentication system based on facial features. The proposed method is based on PCA and LDA for feature extraction, these extracted features are combined using wavelet fusion. In this work we use neural networks to classify extracted features of faces. The proposed method consists of six steps: i) Extraction of images from the database, ii) Preprocessing, iii) Feature extraction using PCA, iv) feature extraction using LDA, v) Wavelet fusion of the extracted features, extracted from PCA and LDA and, vi) classification using neural network. Features are extracted using both PCA and LDA to improve capability of LDA when few samples of images are available. Wavelet fusion and neural networks are used to improve classification accuracy. The proposed system shows improvement over the existing methods particularly when the database contains occluded images. Preliminary experimental results have shown high accuracy of the system.
{"title":"An intelligent authentication system using wavelet fusion of K-PCA, R-LDA","authors":"J. Bodapati, K. Kishore, N. Veeranjaneyulu","doi":"10.1109/ICCCCT.2010.5670591","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670591","url":null,"abstract":"In this work, we proposed a novel authentication system based on facial features. The proposed method is based on PCA and LDA for feature extraction, these extracted features are combined using wavelet fusion. In this work we use neural networks to classify extracted features of faces. The proposed method consists of six steps: i) Extraction of images from the database, ii) Preprocessing, iii) Feature extraction using PCA, iv) feature extraction using LDA, v) Wavelet fusion of the extracted features, extracted from PCA and LDA and, vi) classification using neural network. Features are extracted using both PCA and LDA to improve capability of LDA when few samples of images are available. Wavelet fusion and neural networks are used to improve classification accuracy. The proposed system shows improvement over the existing methods particularly when the database contains occluded images. Preliminary experimental results have shown high accuracy of the system.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122900357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670573
A. Singh, A. Narain
The paper presents a neural network based predictive control (NPC) strategy to control nonlinear chemical process or system. Multilayer perceptron neural network (MLP) is chosen to represent a Nonlinear autoregressive with exogenous signal (NARX) model of a nonlinear process. Based on the identified neural model, a generalized predictive control (GPC) algorithm is implemented to control the composition in a continuous stirred tank reactor (CSTR), whose parameters are optimally determined by solving quadratic performance index using well known Levenberg-Marquardt and Quasi-Newton algorithm. Also an Instantaneous linearization based predictive control (IPC) strategy is discussed, in which an approximated linear model is extracted from nonlinear neural network by instantaneous linearization around operating points. The tracking performance of the NPC and IPC is tested using different amplitude step function as a reference signal on CSTR application and it is shown using simulation results, that the NPC strategy is more effective and robust than the IPC strategy.
{"title":"Neural network based predictive control for nonlinear chemical process","authors":"A. Singh, A. Narain","doi":"10.1109/ICCCCT.2010.5670573","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670573","url":null,"abstract":"The paper presents a neural network based predictive control (NPC) strategy to control nonlinear chemical process or system. Multilayer perceptron neural network (MLP) is chosen to represent a Nonlinear autoregressive with exogenous signal (NARX) model of a nonlinear process. Based on the identified neural model, a generalized predictive control (GPC) algorithm is implemented to control the composition in a continuous stirred tank reactor (CSTR), whose parameters are optimally determined by solving quadratic performance index using well known Levenberg-Marquardt and Quasi-Newton algorithm. Also an Instantaneous linearization based predictive control (IPC) strategy is discussed, in which an approximated linear model is extracted from nonlinear neural network by instantaneous linearization around operating points. The tracking performance of the NPC and IPC is tested using different amplitude step function as a reference signal on CSTR application and it is shown using simulation results, that the NPC strategy is more effective and robust than the IPC strategy.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124882937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670576
P. Subbaraj, P.S. Godwin Anand
This paper presents a modified particle swarm optimization (MPSO) algorithm to design an optimal multi input multi out (MIMO) fuzzy logic controller for a cement mill process. The membership function, rule base and the scaling factor of the multi input multi output FLC is tuned for optimal control performance using MPSO by minimizing the Integral absolute error for minimum and maximum operating setpoints. Simulation results show the effectiveness of the proposed MPSO optimized MIMO FLC work effectively under varying hardness and setpoints. The material hardness is considered upto 1.7 to demonstrate the superior performance of the proposed algorithm over other control algorithms.
{"title":"Modified particle swarm optimized MIMO FLC for complex industrial process","authors":"P. Subbaraj, P.S. Godwin Anand","doi":"10.1109/ICCCCT.2010.5670576","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670576","url":null,"abstract":"This paper presents a modified particle swarm optimization (MPSO) algorithm to design an optimal multi input multi out (MIMO) fuzzy logic controller for a cement mill process. The membership function, rule base and the scaling factor of the multi input multi output FLC is tuned for optimal control performance using MPSO by minimizing the Integral absolute error for minimum and maximum operating setpoints. Simulation results show the effectiveness of the proposed MPSO optimized MIMO FLC work effectively under varying hardness and setpoints. The material hardness is considered upto 1.7 to demonstrate the superior performance of the proposed algorithm over other control algorithms.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127391480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670730
Hema Krishnan, P. Samuel
Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it is created which is termed as requirements model. Unified Modeling Language (UML) models are helpful for understanding the problems, communicating with application experts and preparing documentation. The static design view of the system can be modeled using a UML class diagram. System requirements stated by the user are usually in natural language form despite a wide variety of formal languages and UML. This is an imprecise and inconsistent form which is difficult to be used by the developer for design. We present a new methodology for generating UML class diagrams or models from natural language problem statement or requirement specification. We have named our methodology as Relative Extraction Methodology which uses an intermediate graphical representation called dependency graph. This serves as a skeleton for the generation of UML class models. The natural language processing is done for the construction of dependency graph which is finally mapped to a class diagram.
{"title":"Relative Extraction Methodology for class diagram generation using dependency graph","authors":"Hema Krishnan, P. Samuel","doi":"10.1109/ICCCCT.2010.5670730","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670730","url":null,"abstract":"Requirement analysis is the preliminary step in software development process. The requirements stated by the clients are analyzed and an abstraction of it is created which is termed as requirements model. Unified Modeling Language (UML) models are helpful for understanding the problems, communicating with application experts and preparing documentation. The static design view of the system can be modeled using a UML class diagram. System requirements stated by the user are usually in natural language form despite a wide variety of formal languages and UML. This is an imprecise and inconsistent form which is difficult to be used by the developer for design. We present a new methodology for generating UML class diagrams or models from natural language problem statement or requirement specification. We have named our methodology as Relative Extraction Methodology which uses an intermediate graphical representation called dependency graph. This serves as a skeleton for the generation of UML class models. The natural language processing is done for the construction of dependency graph which is finally mapped to a class diagram.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126337302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670535
N. Kirubanandasarathy, K. Karthikeyan, K. Thirunadanasikamani
Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be merged with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to heighten the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration. The IEEE 802.11n standard based on the MIMO OFDM system provides a very high data throughput from the original data rate of 54 Mb/s to the data rate in excess of 600 Mb/s, because the technique of the MIMO can increase the data rate by extending an OFDM-based system. However, the IEEE 802.11n standard also increases the computational and the hardware complexities greatly, compared with the current Wireless Local Area Network (WLAN) standards. It is a challenge to realize the physical layer of the MIMO OFDM system with minimal hardware complexity and power consumption especially the computational complexity in VLSI implementation. The Fast Fourier Transform / Inverse Fast Fourier Transform (FFT/IFFT) processor is one of the highest computationally complex modules in the physical layer of the IEEE 802.11n standard. However to improve the signal processing capability and to reduce the power consumption as well as the hardware cost of a FFT processor have become challenging targets. In this paper present a pipelined Fast Fourier Transform (FFT) / Inverse Fast Fourier Transform (IFFT) processor for the applications in a MIMO OFDM based IEEE 802.11n WLAN baseband processor is presented. High throughput, memory reduction, low power and complex multiplier reduction are achieved by using higher mixed radix FFT in MIMO-OFDM. The mixed-radix 4/2 with bit reversal FFT architecture is proposed to design the prototype FFT/IFFT processor for MIMO-OFDM systems. The proposed processor with minimal hardware complexity reduces the power consumption.
{"title":"VLSI design of mixed radix FFT Processor for MIMO OFDM in wireless communications","authors":"N. Kirubanandasarathy, K. Karthikeyan, K. Thirunadanasikamani","doi":"10.1109/ICCCCT.2010.5670535","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670535","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is a popular method for high data rate wireless transmission. OFDM may be merged with antenna arrays at the transmitter and receiver to increase the diversity gain and/or to heighten the system capacity on time-variant and frequency-selective channels, resulting in a Multiple-Input Multiple-Output (MIMO) configuration. The IEEE 802.11n standard based on the MIMO OFDM system provides a very high data throughput from the original data rate of 54 Mb/s to the data rate in excess of 600 Mb/s, because the technique of the MIMO can increase the data rate by extending an OFDM-based system. However, the IEEE 802.11n standard also increases the computational and the hardware complexities greatly, compared with the current Wireless Local Area Network (WLAN) standards. It is a challenge to realize the physical layer of the MIMO OFDM system with minimal hardware complexity and power consumption especially the computational complexity in VLSI implementation. The Fast Fourier Transform / Inverse Fast Fourier Transform (FFT/IFFT) processor is one of the highest computationally complex modules in the physical layer of the IEEE 802.11n standard. However to improve the signal processing capability and to reduce the power consumption as well as the hardware cost of a FFT processor have become challenging targets. In this paper present a pipelined Fast Fourier Transform (FFT) / Inverse Fast Fourier Transform (IFFT) processor for the applications in a MIMO OFDM based IEEE 802.11n WLAN baseband processor is presented. High throughput, memory reduction, low power and complex multiplier reduction are achieved by using higher mixed radix FFT in MIMO-OFDM. The mixed-radix 4/2 with bit reversal FFT architecture is proposed to design the prototype FFT/IFFT processor for MIMO-OFDM systems. The proposed processor with minimal hardware complexity reduces the power consumption.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"19 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114130026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-17DOI: 10.1109/ICCCCT.2010.5670781
Chandrasinh Parmar, V.V. Dwivedi, H.H. Wandra
The popularity of wireless communication application is increased specially in the ISM band which provides services for free. Bluetooth is one of the technology in unlicensed band which becomes very useful now a days in many short rage application because of its advantages like low power consumption, low cost, low size, universal applicability, multiple simultaneous link. This paper is on the one of its emerging application. We have already seen many of its application in the market now a days like wireless mouse, key board, speaker, printers, fax cell phone access, PDA access etc using Bluetooth link. The use of portable Memory like flash memory known as pen drive, smart card portable hard disk etc. is very popular and common so the theme of this paper is to access a portable memory which may in the pocket of someone in its range without connecting via cable, of course with permission of memory owner via pass key. This paper is on the emerging application, the wireless memory access through Bluetooth enabled DTE. The main focus of this paper is on wireless memory module side, specifically a firmware for transfer file read, write and erase from Bluetooth transceiver to flash memory using micro controller.
{"title":"Firmware for file transfer between Bluetooth module and flash memory through microcontroller in an emerging concept of wireless portable memory access","authors":"Chandrasinh Parmar, V.V. Dwivedi, H.H. Wandra","doi":"10.1109/ICCCCT.2010.5670781","DOIUrl":"https://doi.org/10.1109/ICCCCT.2010.5670781","url":null,"abstract":"The popularity of wireless communication application is increased specially in the ISM band which provides services for free. Bluetooth is one of the technology in unlicensed band which becomes very useful now a days in many short rage application because of its advantages like low power consumption, low cost, low size, universal applicability, multiple simultaneous link. This paper is on the one of its emerging application. We have already seen many of its application in the market now a days like wireless mouse, key board, speaker, printers, fax cell phone access, PDA access etc using Bluetooth link. The use of portable Memory like flash memory known as pen drive, smart card portable hard disk etc. is very popular and common so the theme of this paper is to access a portable memory which may in the pocket of someone in its range without connecting via cable, of course with permission of memory owner via pass key. This paper is on the emerging application, the wireless memory access through Bluetooth enabled DTE. The main focus of this paper is on wireless memory module side, specifically a firmware for transfer file read, write and erase from Bluetooth transceiver to flash memory using micro controller.","PeriodicalId":250834,"journal":{"name":"2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}